Operating systems (11) Flashcards

1
Q

You have several older applications, some originally run on Windows 95. You suspect application compatibility issues may occur on Windows 10. What step can you take to continue using those old applications?

Maintain older Windows systems for which applications were intended.

Use Compatibility mode on Windows 10, set to Windows 95

Replace older applications with modern day equivalents

A

Use Compatibility mode on Windows 10, set to Windows 95

Compatibility mode is for this purpose and can be set as far back as Windows 95. Relying on vendors for updated versions or identifying a modern replacement is uncertain at best. Maintain a series of older systems is a security risk, assuming end-of-life has passed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As a systems administrator, you issued a policy update to the computer ABC1 using the command line utility gpupdate. Which of the following commands and switches would help ensure the policy changes are in effect?

gpscan /v ABC1

gpupdate /scan:ABC1

gpresult /scope:ABC1

A

gpresult /scope:ABC1

The command line utility gpresult. The switch /scope displays results for either user or computer results. Values for the /scope switch can be either a user or a computer. Without the /scope switch, gpresult shows both user and computer settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following scenarios involves User Account Management in Windows 10?

Users ask for Internet access

Users request their theme settings be synchronized together

User requests you to wipe his extended partition

A

Users request their theme settings be synchronized together

User account management is performed in Windows 10 for a variety of predictable actions such as create or delete a user, grant or deny privileges, change a password. Also included is the ability to sync Windows settings like theme, language preference and Internet Explorer settings across users. However, Internet access over the network is likely granted at a perimeter network device. Getting a printer involves procurement, while wiping a partition involves disk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When using Windows Management Interface Command, what is the disk management command used to check the drive status?

diskdrive get status

disk status check

diskdrive health

A

diskdrive get status

To check drive status, type wmic at a command prompt. At the WMIC prompt, type diskdrive get status. The command’s response is (hopefully) Status OK. If a drive is failing, you will see a different response, for example “Pred Fail,” which generally points to many bad sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You purchased a new Windows 10 desktop, the drive for which came as a single partition. What is the least destructive method allowed in Windows 10 to create three partitions from the one large partition?

Split the partition once, then again to create a third partition

Create bootable installation media. Format and create the new partitions

Install a second physical disk, which can be split into two partitions

A

Split the partition once, then again to create a third partition

Splitting partitions means to create two partitions from one. To split a partition, you first shrink the partition, then create a new, second partition from the unallocated space. No need for more destructive measures or returning the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user needs a printer to print in color and legal size, but the user does not have the privileges to change printer settings. How do you proceed to make the changes for him?

Walk to the printer and change the settings on its attached display panel

Tell the user you need to take lunch first

Adjust the printer’s settings for the user in the Windows Control Panel

A

Adjust the printer’s settings for the user in the Windows Control Panel

Given your escalated privileges, you can adjust the printer for the user’s print job within the Windows Control Panel. Right-clicking on the particular printer, you open “Printing Preferences” to make the change. Not all printers have a display panel for adjusting settings. Even so, other users do not want the changed settings to apply to their print jobs. Delaying or directing a user elsewhere are simply unacceptable options, give your capacity to help

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An HR manager mentions he can’t hear any sound from his Windows 10 laptop watching a video of his son’s soccer game. To fix the problem, where would you direct the HR employee to go?

Suggest the manager go check the sound driver license

Have the user adjust Sound settings under the Control Panel

Calibrate the laptop speakers with a matching-sized magnet.

A

Have the user adjust Sound settings under the Control Panel

The Sound settings are under Control Panel, under Hardware. While forwarding the video to try on a different laptop is sound troubleshooting, it’s unlikely a silent video is the cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user is frustrated with what seems to be a common problem. Unfortunately, you are unavailable for the next few hours. Despite the user having little technical knowledge, he is willing to hear any suggestions you have to fix it. What can you suggest the user try, to diagnose and even possibly fix the problem by himself?

Have the user read the manual

Suggest the Automated Serve and Protect tool in the Control Panel’s Security section to troubleshoot the problem

Direct the user to continue at a different desk for the remainder of the week

A

Suggest the Automated Serve and Protect tool in the Control Panel’s Security section to troubleshoot the problem

After the tool finishes its analysis, the tool issues a Troubleshooting report listing both “Issues Found” and “Potential issues that were checked”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user asks for help with installing an application on their desktop. He wants to run Active Directory Domain Services to help with studying for a test. He confirms the desktop is powerful enough and has enough storage to meet the application’s system requirements. but the application will not complete the installation. What could be the problem?

Drive space is too limited

Conflicting with another application

OS compatibility issue

A

OS compatibility issue

The user confirmed the desktop has enough drive space and RAM. The likely problem is the user’s desktop is running a desktop OS, such as Windows 10, but trying to install an application intended for a server OS, such as Windows Server 2019. The desktop fails to meet OS requirements and is an OS compatibility issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When trying to install an application, the install process halts with a message about requiring access to the system directory. Which of the following actions would help the install process to complete?

Install additional RAM

Change the local user permissions

Propose a different installation directory

A

Change the local user permissions

If the installation process fails with a message about the system directory, it’s likely the local user does not have permissions or privileges to install the application. The message said nothing about hardware requirements and proposing a different installation directory would not stop the installation requiring access to the system directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The CEO asks the local IT administrator to copy the company’s financial data to a second system for the sake of backup. The financial data is critical to the company’s success. The administrator places a copy of the data on the company’s public web server. What has the administrator failed to consider in fulfilling the CEO’s request?

Security considerations and impact to the device

Performance considerations and capacity of the device

Local user considerations and use of the device

A

Security considerations and impact to the device

The IT administrator should not copy company critical data to a public facing server. This is a security concern and poses a high risk to the data. The other options may be legitimate but are hardly as significant as the security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The disk in a user’s Mac OS desktop has fallen victim to ransomware, which encrypts all their data without chance to recover it. What best practice should the user adopt for their Mac OS desktop to prevent this issue from happening again?

The user should begin doing scheduled disk maintenance

The user should regularly perform drivers/firmware updates

The user should regularly perform antivirus/anti-malware updates

A

The user should regularly perform antivirus/anti-malware updates

If the user had regularly updated antivirus/anti-malware updates, ransomware might have been caught and quarantined or deleted before encrypting the user’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user chose to install a different Linux desktop operating system. He was excited to finally install the distro image he had been saving for over a year. He soon noticed that certain applications were unable to run or install correctly. What best practice had the user likely failed to adopt for their Linux OS desktop?

The user should perform patch management

The user should a system update

The user should update their antivirus/anti-malware

A

The user should a system update

Knowing the user installed an older distro image suggests incompatibility issues between the distro and installed applications, assumed newer. The user should have used a new version of the distro and after installing, ran commands such as apt-get update or apt-get dist-upgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The hard drive on a user’s Mac OS desktop has recently failed. The data is unrecoverable. What best practice should the user adopt to prevent losing their data again?

The user should begin doing scheduled system updates

The user should perform scheduled backups

The user should regularly perform antivirus/anti-malware updates

A

The user should perform scheduled backups

Had the user been regularly performing backups on a backup server, the data would be recoverable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The hard drive on a user’s Mac OS desktop seems to be performing quite slowly. Finally, after a few applications report lost or corrupted data, the user decides to ask the local IT person for help. What best practice does the IT person suspect is not being done?

The user needs to begin doing scheduled disk maintenance

The user needs to regularly perform drivers/firmware updates

The user needs to regularly perform antivirus/anti-malware updates

A

The user needs to begin doing scheduled disk maintenance

Given the information provided, the hard drive seems to be having performance or corruption issues. If the user had adopted the best practice of doing scheduled disk maintenance, its likely issues would have been avoided or identified earlier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user’s Linux OS desktop was recently exploited by malware. What best practice should the user adopt for their Linux OS desktop to prevent this issue from happening again?

The user should begin doing scheduled disk maintenance

The user should regularly perform scheduled backups

The user should regularly perform patch management

A

The user should regularly perform patch management

If the user had regularly done patch management, the malware likely would not have been to exploit their system

17
Q

After attaching the latest innovative gadget to their Mac OS desktop, a user is disappointed it doesn’t seem to do what it’s supposed to do. The user repeatedly installs the needed drivers and application. The application does give a message about system compatibility but the user is certain all hardware requirements are met. What best practice is the user not considering?

The user needs to regularly perform drivers/firmware updates

The user needs to regularly perform antivirus/anti-malware updates

The user needs to regularly perform drivers/firmware updates

A

The user needs to regularly perform drivers/firmware updates

Given the information provided, it seems the user could consider updating the desktop’s firmware

18
Q

A Mac OS desktop user needs to install a tool to create backups of their desktop. The user does not want to have to buy or install any extra applications. Which of the following tools would help this user?

Timeshift

Time Machine

Time Warp

A

Time Machine

Time Machine is a native Mac OS application installed on all Mac OS systems. Time Machine is used for creating backup images. You can exclude particular files or folders. The backup files are stored on an external drive, but you can also create snapshots and save them locally

19
Q

A Linux Mint desktop user wants to install a tool to create restore/snapshots of their desktop. Which of the following tools would help this user?

Timeshift

Time Machine

Time Warp

A

Timeshift

Timeshift is a popular application used to maintain Linux file system files and settings. Timeshift is not the application used to back up your personal files or documents

20
Q

A user new to having a Mac OS desktop wants to verify their desktop’s connectivity to the network. The user knows about the command utility ping but does not know how to open it on a Mac OS without the DOS prompt. Which of the following tools would help this user?

Terminal

DOS box

Pages

A

Terminal

Terminal is the tool that most resembles the command box in Windows or the Linux terminal. For the Mac OS, Terminal is actually a terminal emulator, which is just as capable for browsing the file system or running utilities like ping

21
Q

A Mac OS desktop user wants to perform some disk maintenance. She needs a utility that can both check the health and format an external drive. Which of the following tools would satisfy her requirements?

Disk Utility

Timeshift

Sophos Home for Mac

A

Disk Utility

The application Disk Utility is native to every Mac OS desktop and can perform on both local and external drives. Timeshift is a Linux OS tool for system file backup and recovery. Sophos Home for Mac is an antivirus tool. VmStat monitors statistics on virtual memory, CPU activity and other system data, but it is for Linux systems. Mac OS has a similar tool named vm_stat

22
Q

On the Mac OS desktop, what is the purpose of the tool called Sharing?

File sharing

Screen sharing

Bluetooth sharing

All the above

A

All the above

Unlike any single tool for Microsoft Windows, Mac OS has a tool which offers a diverse range of sharing capabilities. The tool Sharing is used for sharing the screen, files, peripherals, Bluetooth, and Internet access as well as a variety of remote management capabilities

23
Q

A user new to the Mac OS is asking if her desktop has any application for saving and managing her passwords. What is the native Mac OS tool for password management?

MacinKey

KeyChain

Key Ring

A

KeyChain

Keychain is the password management tool that’s native to Mac OS, meaning it comes pre-installed with the desktop OS

24
Q

A user knows her Mac OS desktop allows her to search for any file or document. But she recently noticed she can search by description, not just by name. What is the name of this Mac OS utility?

Search

SpotLight

Spot

A

SpotLight

Spotlight indexes files and folders, beginning to show results as you type in the search box, located at the top right of any Finder window, the file explorer application